ID

VAR-202006-0086


CVE

CVE-2020-12883


TITLE

Arm Mbed OS Buffer error vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-007007

DESCRIPTION

Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors. ARM Mbed OS is a set of open source embedded operating system dedicated to the Internet of Things of the British ARM company. CoAP library is one of the Constrained Application Protocol (CoAP) libraries. Attackers can use this vulnerability to cause denial of service

Trust: 2.7

sources: NVD: CVE-2020-12883 // JVNDB: JVNDB-2020-007007 // CNVD: CNVD-2021-20266 // CNNVD: CNNVD-202006-1276

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-20266

AFFECTED PRODUCTS

vendor:armmodel:mbed osscope:eqversion:5.15.3

Trust: 2.4

sources: CNVD: CNVD-2021-20266 // JVNDB: JVNDB-2020-007007 // NVD: CVE-2020-12883

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12883
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-007007
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-20266
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202006-1276
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-12883
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-007007
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-20266
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-12883
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-007007
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-20266 // JVNDB: JVNDB-2020-007007 // CNNVD: CNNVD-202006-1276 // NVD: CVE-2020-12883

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:CWE-119

Trust: 0.8

sources: JVNDB: JVNDB-2020-007007 // NVD: CVE-2020-12883

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202006-1276

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202006-1276

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-007007

PATCH

title:Bugfix/coap parser mem access bugs #116url:https://github.com/ARMmbed/mbed-coap/pull/116

Trust: 0.8

title:Out of range memory access in MbedOS CoAP library parser #12925url:https://github.com/ARMmbed/mbed-os/issues/12925

Trust: 0.8

title:Out of range memory access in MbedOS CoAP library parser - option number #12926url:https://github.com/ARMmbed/mbed-os/issues/12926

Trust: 0.8

title:Out of range memory access in MbedOS CoAP library parser - option value length #12927url:https://github.com/ARMmbed/mbed-os/issues/12927

Trust: 0.8

title:Patch for ARM Mbed OS CoAP library buffer overflow vulnerability (CNVD-2021-20266)url:https://www.cnvd.org.cn/patchInfo/show/253716

Trust: 0.6

sources: CNVD: CNVD-2021-20266 // JVNDB: JVNDB-2020-007007

EXTERNAL IDS

db:NVDid:CVE-2020-12883

Trust: 3.0

db:JVNDBid:JVNDB-2020-007007

Trust: 0.8

db:CNVDid:CNVD-2021-20266

Trust: 0.6

db:CNNVDid:CNNVD-202006-1276

Trust: 0.6

sources: CNVD: CNVD-2021-20266 // JVNDB: JVNDB-2020-007007 // CNNVD: CNNVD-202006-1276 // NVD: CVE-2020-12883

REFERENCES

url:https://github.com/armmbed/mbed-os/issues/12925

Trust: 1.6

url:https://github.com/armmbed/mbed-os/issues/12926

Trust: 1.6

url:https://github.com/armmbed/mbed-os/issues/12927

Trust: 1.6

url:https://github.com/armmbed/mbed-coap/pull/116

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-12883

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12883

Trust: 0.8

sources: JVNDB: JVNDB-2020-007007 // CNNVD: CNNVD-202006-1276 // NVD: CVE-2020-12883

SOURCES

db:CNVDid:CNVD-2021-20266
db:JVNDBid:JVNDB-2020-007007
db:CNNVDid:CNNVD-202006-1276
db:NVDid:CVE-2020-12883

LAST UPDATE DATE

2024-11-23T22:25:26.987000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-20266date:2021-03-23T00:00:00
db:JVNDBid:JVNDB-2020-007007date:2020-07-29T00:00:00
db:CNNVDid:CNNVD-202006-1276date:2020-07-02T00:00:00
db:NVDid:CVE-2020-12883date:2024-11-21T05:00:29.127

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-20266date:2021-03-18T00:00:00
db:JVNDBid:JVNDB-2020-007007date:2020-07-29T00:00:00
db:CNNVDid:CNNVD-202006-1276date:2020-06-18T00:00:00
db:NVDid:CVE-2020-12883date:2020-06-18T19:15:09.893